With the growing influx of new mobile devices, connected things, bandwidth intensive applications and more data, the network is more relevant to business success than ever before. Back in June of 2012, Cisco saw that we needed to move away from multiple network systems loosely linked together to an agile and simple infrastructure, streamlined policy and centralized management would be needed to support new business demands. We called it Cisco Unified Access and we aligned the solution to three pillars: One Network, One Policy and One Management.
For the last few years, we have focused on delivering new products and functionality under this Unified Access model. Below is a timeline of products released as part of the Unified Access framework. Cisco lead the way in delivering gigabit 802.11ac Wi-Fi., converged wireless control in access switches and through the acquisition of Meraki – a complete cloud-managed network solution.
The timeline above doesn’t represent every feature and function we have delivered, but it shows Cisco’s commitment to this Unified Access model, both from a cloud-managed and on-premise solution perspective.
Today, Cisco is announcing a number of new products and new functionality to existing products that will help mobilize the workforce, secure the business and increase IT agility. The announcement includes the following: Read More »
I am sitting and reflecting here at the start of Cisco Live London. As I walk the halls, I continue to be amazed by the size, depth, and breadth of this event. Networking continues to grow, and thousands of people are eager to come together to see the latest. Read More »
In an effort to reduce costs and improve operational efficiency, organizations of all sizes have begun compressing their firewall and other security services into smaller form factors and fewer physical units. Many small and midsized companies have opted for UTMs to run all of their security on a single box. Unfortunately, UTMs have failed to deliver on their promise to deliver true multi-service security. Most UTMs do one or two things really well, but add all the other services as “checkbox” items just to say they have it. Read More »
I’ve always been interested in the human desire to belong to groups and how we adapt our appearance to show which ‘group’ we’re in. Even in our teenage years when many of us believe the way we dress is non-conformist in truth we’re aligning ourselves to a sub-group that exists out there.
A friend of mine in her first year at university always wore Levi 501s and walked to her English lectures with an Eighteenth century novel poking out of her right back pocket and a pack of Marlboro cigarettes in her left. The signals she hoped she gave off then make her cringe beyond belief today!
Because that’s what happens, the identity we choose to present to the outside world changes over time. Many of us become less concerned about rebelling, or we gain confidence about our identity and the way we choose to transmit it.